US6898555B2 - Method for indicating the integrity of use-information of a computer program - Google Patents
Method for indicating the integrity of use-information of a computer program Download PDFInfo
- Publication number
- US6898555B2 US6898555B2 US10/617,756 US61775603A US6898555B2 US 6898555 B2 US6898555 B2 US 6898555B2 US 61775603 A US61775603 A US 61775603A US 6898555 B2 US6898555 B2 US 6898555B2
- Authority
- US
- United States
- Prior art keywords
- value
- information
- marker file
- program
- file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime, expires
Links
- 238000000034 method Methods 0.000 title claims abstract description 28
- 238000004590 computer program Methods 0.000 title description 5
- 239000003550 marker Substances 0.000 claims abstract description 79
- 238000007789 sealing Methods 0.000 claims abstract description 12
- 230000000694 effects Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
Definitions
- use-information refers herein to information about measured use of a program on a computer, e.g. the remaining time for using the program, the number of times the program has been executed, and so forth.
- the use-information of a program is stored in a file, the registry of the user's computer, a hardware dongle, network server, etc.
- the use of a program is measured by tracing an “exhausting resource” associated with the use.
- a program can be restricted to a trial period (the resource is the time), or to a predefined number of times the program is allowed to be executed (the resource is a counter), the accumulated run-time of the program, etc.
- integration of content refers herein to content which has not been tampered with either at the file (manipulation of file contents) or file-system (manipulation of files or directories) levels.
- external refers herein to a computing facility to be added to a computer to perform a function which the computer as is, is not able to perform.
- a smartcard chip for example, a smartcard chip, “atomic” clock, etc.
- the present invention makes use of a mechanism which performs the followings:
- UVG Unique Value Generator
- the UVG mechanism is instructed to generate a new unique value. Then, the generated unique value is “sealed” with the use-information in order to indicate changes in the use-information. Consequently the integrity of the use-information is examined by the correspondence of the stored unique value with the current unique value of the UVG.
- the integrity of the use-information is examined, and in case the integrity is indicated, the program is allowed to operate in accordance with its license (e.g. the trial period has not expired), otherwise the program may stop, warn the user, etc.
- Sealing the unique value with the use-information can be carried out by adding a digital signature to the data chunk (i.e. the stored unique value with the use-information), encrypting the data chunk, keeping the data chunk out of the reach of a hacker (e.g. in an external device to the computer, such as smartcard), and so forth.
- a digital signature i.e. the stored unique value with the use-information
- encrypting the data chunk keeping the data chunk out of the reach of a hacker (e.g. in an external device to the computer, such as smartcard), and so forth.
- the UVG is based on the file ID mechanism, whenever it is available, e.g. in the Windows NT, Windows 2000 operating systems.
- the file ID (referred herein as FID) is a unique value that distinguishes one file from another, in a file system. Whenever a file is created, a unique FID is assigned to the file.
- Typical operations with a marker file are: opening and verifying the FID as described above, creating a new marker file thereby generating a new ID for a UVG mechanism, storing the FID along with the use-information in a marker file, deleting the old marker file thereby making the current unique value as irrelevant, renaming a marker file, and so forth.
- FIG. 1 is a flowchart of a method for indicating the integrity of use-information of a program, according to a preferred embodiment of the present invention.
- erasing a file doesn't necessary mean losing its content, but merely turning on its delete-flag. In this case the hacker can “revive” a deleted marker file by changing its delete-flag.
- preventing the use of the information stored within a marker file can be carried out by changing its content before its removal (for example, setting all its bytes to “0”), adding the sectors of the erased marker file to the end of another file, and so forth.
- the compared unique identification numbers do not necessarily have to be equal, but to correspond.
- the stored identification number is not necessarily the number of the first sector of the marker, but the number of a sector of the marker file, selected randomly.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
Description
- (a) Derives upon request a value which sustains at least the following features:
- The value is unique or at least “pseudo-unique” (i.e. even if a value is repeated, it still will not be easy for a hacker to follow)(note that the term pseudo- include unique as a special case);
- The value is “asymmetric” (i.e. as per the user, the value is read only. Typically only the operating system can alter this value.)
- (b) Returns upon request the last derived value.
- (a) Creating a new marker file (e.g. NEW.DAT), thereby generating a new unique value;
- (b) Deleting the existing marker file (e.g. CURRENT.DAT), thereby making the old value irrelevant;
- (c) Renaming the new marker file (i.e. NEW.DAT) as the erased marker file (i.e. CURRENT.DAT), thereby a new generated value becomes the current unique value of the UVG.
Claims (15)
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/617,756 US6898555B2 (en) | 2003-07-14 | 2003-07-14 | Method for indicating the integrity of use-information of a computer program |
EP04744967A EP1644882A4 (en) | 2003-07-14 | 2004-07-13 | A method for indicating the integrity of use-information of a computer program |
PCT/IL2004/000627 WO2005006108A2 (en) | 2003-07-14 | 2004-07-13 | A method for indicating the integrity of use-information of a computer program |
IL173083A IL173083A (en) | 2003-07-14 | 2006-01-11 | Method for indicating the integrity of use-information of a computer program |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/617,756 US6898555B2 (en) | 2003-07-14 | 2003-07-14 | Method for indicating the integrity of use-information of a computer program |
Publications (2)
Publication Number | Publication Date |
---|---|
US20050015218A1 US20050015218A1 (en) | 2005-01-20 |
US6898555B2 true US6898555B2 (en) | 2005-05-24 |
Family
ID=34062409
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/617,756 Expired - Lifetime US6898555B2 (en) | 2003-07-14 | 2003-07-14 | Method for indicating the integrity of use-information of a computer program |
Country Status (3)
Country | Link |
---|---|
US (1) | US6898555B2 (en) |
EP (1) | EP1644882A4 (en) |
WO (1) | WO2005006108A2 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030208680A1 (en) * | 1996-06-28 | 2003-11-06 | Shannon Byrne | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software |
US20040039916A1 (en) * | 2002-05-10 | 2004-02-26 | David Aldis | System and method for multi-tiered license management and distribution using networked clearinghouses |
US20060021061A1 (en) * | 2004-07-07 | 2006-01-26 | Fabio Cerri | Method and apparatus for metering usage of software products using multiple signatures |
US20060288040A1 (en) * | 2005-06-03 | 2006-12-21 | Paul Boerger | System having an apparatus that uses a resource on an external device |
US20080175384A1 (en) * | 2002-04-22 | 2008-07-24 | Shannon Byrne | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software |
US20080235664A1 (en) * | 2006-05-23 | 2008-09-25 | Giancarlo Carbone | Method, system and computer program for discovering multi-component software products |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9286445B2 (en) * | 2003-12-18 | 2016-03-15 | Red Hat, Inc. | Rights management system |
US8799680B2 (en) | 2005-09-15 | 2014-08-05 | Microsoft Corporation | Transactional sealed storage |
US9084901B2 (en) | 2006-04-28 | 2015-07-21 | Medtronic, Inc. | Cranial implant |
US11934493B2 (en) * | 2021-06-17 | 2024-03-19 | EMC IP Holding Company LLC | Anti-piracy protection service-based software license management system to prevent usage of unlicensed software after the trial period |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040015426A1 (en) * | 2002-03-14 | 2004-01-22 | Bijan Tadayon | System and method for expressing usage rights with sound signals |
US20040030912A1 (en) * | 2001-05-09 | 2004-02-12 | Merkle James A. | Systems and methods for the prevention of unauthorized use and manipulation of digital content |
US20040236945A1 (en) * | 2003-05-21 | 2004-11-25 | Hank Risan | Method and system for controlled media sharing in a network |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4658093A (en) * | 1983-07-11 | 1987-04-14 | Hellman Martin E | Software distribution system |
US5327563A (en) * | 1992-11-13 | 1994-07-05 | Hewlett-Packard | Method for locking software files to a specific storage device |
JP2810033B2 (en) * | 1996-07-08 | 1998-10-15 | 村越 弘昌 | Operation management system and operation management method |
WO2001033317A1 (en) * | 1999-10-29 | 2001-05-10 | Koninklijke Philips Electronics N.V. | Assuring data integrity via a secure counter |
GB2378780B (en) * | 2001-08-14 | 2003-07-09 | Elan Digital Systems Ltd | Data integrity |
-
2003
- 2003-07-14 US US10/617,756 patent/US6898555B2/en not_active Expired - Lifetime
-
2004
- 2004-07-13 WO PCT/IL2004/000627 patent/WO2005006108A2/en active Application Filing
- 2004-07-13 EP EP04744967A patent/EP1644882A4/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040030912A1 (en) * | 2001-05-09 | 2004-02-12 | Merkle James A. | Systems and methods for the prevention of unauthorized use and manipulation of digital content |
US20040015426A1 (en) * | 2002-03-14 | 2004-01-22 | Bijan Tadayon | System and method for expressing usage rights with sound signals |
US20040236945A1 (en) * | 2003-05-21 | 2004-11-25 | Hank Risan | Method and system for controlled media sharing in a network |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030208680A1 (en) * | 1996-06-28 | 2003-11-06 | Shannon Byrne | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software |
US7356847B2 (en) | 1996-06-28 | 2008-04-08 | Protexis, Inc. | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software |
US20110010299A1 (en) * | 1996-06-28 | 2011-01-13 | Shannon Lee Byrne | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software |
US20080175384A1 (en) * | 2002-04-22 | 2008-07-24 | Shannon Byrne | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software |
US7770230B2 (en) | 2002-04-22 | 2010-08-03 | Arvato Digital Services Canada, Inc. | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software |
US20040039916A1 (en) * | 2002-05-10 | 2004-02-26 | David Aldis | System and method for multi-tiered license management and distribution using networked clearinghouses |
US7860239B2 (en) * | 2004-07-07 | 2010-12-28 | International Business Machines Corporation | Method and apparatus for metering usage of software products using multiple signatures |
US20060021061A1 (en) * | 2004-07-07 | 2006-01-26 | Fabio Cerri | Method and apparatus for metering usage of software products using multiple signatures |
US20060288040A1 (en) * | 2005-06-03 | 2006-12-21 | Paul Boerger | System having an apparatus that uses a resource on an external device |
US9063941B2 (en) * | 2005-06-03 | 2015-06-23 | Hewlett-Packard Development Company, L.P. | System having an apparatus that uses a resource on an external device |
US10102213B2 (en) | 2005-06-03 | 2018-10-16 | Hewlett-Packard Development Company, L.P. | System having an apparatus that uses a resource on an external device |
US20080235664A1 (en) * | 2006-05-23 | 2008-09-25 | Giancarlo Carbone | Method, system and computer program for discovering multi-component software products |
US8010947B2 (en) | 2006-05-23 | 2011-08-30 | International Business Machines Corporation | Discovering multi-component software products based on weighted scores |
US8438543B2 (en) | 2006-05-23 | 2013-05-07 | International Business Machines Corporation | Discovering multi-component software products |
Also Published As
Publication number | Publication date |
---|---|
US20050015218A1 (en) | 2005-01-20 |
EP1644882A2 (en) | 2006-04-12 |
WO2005006108A2 (en) | 2005-01-20 |
EP1644882A4 (en) | 2010-06-02 |
WO2005006108A3 (en) | 2005-04-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9171005B2 (en) | System and method for selective file erasure using metadata modifcations | |
US6378071B1 (en) | File access system for efficiently accessing a file having encrypted data within a storage device | |
US8612671B2 (en) | Removable devices | |
JP5175856B2 (en) | Protection and method of flash memory block in secure device system | |
US6834799B2 (en) | IC card with capability of having plurality of card managers installed | |
EP1402372B1 (en) | Recording apparatus, medium, method, and related computer program | |
CN102473223B (en) | Information processing device and information processing method | |
US6898555B2 (en) | Method for indicating the integrity of use-information of a computer program | |
JP2723231B2 (en) | Software rights management control method | |
CN112148794A (en) | Version management method and device of intelligent contract and storage medium | |
KR101624387B1 (en) | Method for software asset management based on software birthmark and apparatus thereof | |
JP4149434B2 (en) | Method and system for accessing at least one target file in a computer system having an operating system in which file locking is enforced when the file is opened | |
EP1977551B1 (en) | Binding a protected application program to shell code | |
CN113835645A (en) | Data processing method, device, equipment and storage medium | |
JPH0283622A (en) | System for installing chargeable software on plural computers by single medium | |
KR101118494B1 (en) | Method for writing data and applications into identification media | |
CN109344089B (en) | Method and device for operating norflash | |
JPS6125261A (en) | Protection system for software product | |
KR100637350B1 (en) | Method for certifying execution of application, Recordable medium saved above method and External storage | |
JP2005071314A (en) | Software protection system by usb connection storage device or the like | |
JP2006344104A (en) | File management program and file management device | |
JP2001356964A (en) | Ciphered data storage device | |
CN116841461A (en) | Disk protection method and device, electronic equipment and storage medium | |
CN115292761A (en) | Security chip data protection method, security chip and storage medium | |
JP2005099963A (en) | License management system and method, and recording medium for license management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ALADDIN KNOWLEDGE SYSTEMS LTD., ISRAEL Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LEVI, ASAF;DARZIV, RON;MARGALIT, YANKI;AND OTHERS;REEL/FRAME:014750/0776 Effective date: 20030714 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: DEUTSCHE BANK TRUST COMPANY AMERICAS, AS COLLATERA Free format text: FIRST LIEN PATENT SECURITY AGREEMENT;ASSIGNOR:ALLADDIN KNOWLEDGE SYSTEMS LTD.;REEL/FRAME:024892/0677 Effective date: 20100826 |
|
AS | Assignment |
Owner name: DEUTSCHE BANK TRUST COMPANY AMERICAS, AS COLLATERA Free format text: SECOND LIEN PATENT SECURITY AGREEMENT;ASSIGNOR:ALLADDIN KNOWLEDGE SYSTEMS LTD.;REEL/FRAME:024900/0702 Effective date: 20100826 |
|
AS | Assignment |
Owner name: SAFENET DATA SECURITY (ISRAEL) LTD., ISRAEL Free format text: CHANGE OF NAME;ASSIGNOR:ALADDIN KNOWLEDGE SYSTEMS LTD.;REEL/FRAME:025848/0923 Effective date: 20101119 |
|
FEPP | Fee payment procedure |
Free format text: PAT HOLDER NO LONGER CLAIMS SMALL ENTITY STATUS, ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: STOL); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
SULP | Surcharge for late payment |
Year of fee payment: 7 |
|
AS | Assignment |
Owner name: ALADDIN KNOWLEDGE SYSTEMS LTD, MARYLAND Free format text: FIRST LIEN PATENT SECURITY AGREEMENT RELEASE;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS, AS COLLATERAL AGENT;REEL/FRAME:032437/0257 Effective date: 20140305 Owner name: ALADDIN KNOWLEDGE SYSTEMS LTD, MARYLAND Free format text: SECOND LIEN PATENT SECURITY AGREEMENT RELEASE;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS, AS COLLATERAL AGENT;REEL/FRAME:032437/0341 Effective date: 20140305 |
|
FPAY | Fee payment |
Year of fee payment: 12 |
|
AS | Assignment |
Owner name: THALES DIS ISRAEL LTD, ISRAEL Free format text: CHANGE OF NAME;ASSIGNOR:SAFENET DATA SECURITY (ISRAEL) LTD.;REEL/FRAME:064914/0239 Effective date: 20191212 |